secure access service edge (SASE)
knowledge with this short quiz.
All the Above.
Users, data and applications are moving outside the traditional network perimeters of headquarters and data centers as well as to the cloud (SaaS, PaaS, IaaS, and public clouds). Organizations are unable to effectively protect their users, apps and data, causing a shift in networking and security requirements. Enter secure access service edge (SASE).
D. Both Mobile and Remote Users as well as Branch and retail
SASE is an ideal solution to support remote workforces, both branch or retail and mobile or remote users. Each scenario requires access to the data center, internet and cloud applications with seamless user experience and protection from threats. With SASE, organizations have complete visibility and inspection of traffic across all ports and protocols.
C. Network Segmentation
While Network Segmentation may seem like a core networking capability of SASE, it is, in fact, not. A true SASE solution incorporates a network as a service layer, like SD-WAN, VPN, ZTNA or QoS, as well as security as a service layer to provide a single cloud-based platform.
SD-WAN and VPN are key networking capabilities, but they are not the only ones. Zero Trust network access and quality of service are equally important for businesses to implement in their network environments.
All the Above.
A SASE solution encompasses all of these security features to provide organizations one cloud-delivered platform to view and manage all threats, activities and users no matter where they are on the network.
A SASE solution eliminates the need for multiple point products, all with different implementation, reporting and policy requirements. With a single cloud-based infrastructure, SASE delivers multiple types of security services combined with networking services.
© 2023 Palo Alto Networks, Inc. All rights reserved.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.